Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breaches

RSS Feed   
Data Breaches Reports
 
Pockit Integrates Onfido to Meet Their KYC & AML Requirements
sponsored by Onfido
CASE STUDY: Pockit, a privately owned bank, was faced with the challenge of onboarding customers and verifying their identity. Download this case study to learn how Onfido helped them meet their AML and KYC requirements along with quickly onboarding new customers.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Onfido

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

True Cost of Fraud Webinar
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.
Posted: 23 Oct 2019 | Premiered: Oct 23, 2019

LexisNexis® Risk Solutions

Where Security Accountability Stops and Starts In the Public Cloud
sponsored by Cyber-Ark Software
WHITE PAPER: Whether in the cloud or on-premises, credentials are vital to secure and manage. It is especially important to protect privileged credentials because they allow the escalation of privileges within the cloud infrastructure. In this white paper, learn why a privileged access security strategy is key to protecting critical data in the cloud.
Posted: 15 Jul 2019 | Published: 30 Jun 2019

Cyber-Ark Software

How long does it take to get owned?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Financial Services, Fraud and the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Onfido

JustGiving Turns to Onfido to Onboard More Customers, and for Seamless Integration
sponsored by Onfido
CASE STUDY: In this case study, learn how JustGiving, a leading social platform for charitable giving, was able to prevent fraudulent activity, increase its identity verification rates, and onboard users more quickly by using Onfido.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Onfido

Detect and Prevent Identity Theft
sponsored by SAS
WHITE PAPER: In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

SAS

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Zero Trust Internet Is the Answer for 100% Email and Web Security
sponsored by Menlo Security
WHITE PAPER: Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

Menlo Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement